Week 7 DB
1. Review Fraud Risk Factors. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) policies that a company could put in place in order to counter the risk factor in question.
2.Review the types of enterprise systems ERP: Enterprise Resource Planning, SCM: Supply Chain Management, CPFR: Collaborative Planning, Forecasting and Replenishment, CRM: Customer Relationship Management. Next, imagine that you are an IT organizational leader in a mid-sized company, and determine the type of enterprise system that your company would choose for an initial implementation if your company were to move away from legacy systems. Provide a rationale for your response.
Week 8 DB
1. Determine the main reasons why visualization technologies are becoming an important part of organizational success. Select two (2) such technologies related to information systems and analyze the manner in which the utilization of the selected technologies could help the organization stay efficient. Include at least one (1) example of such utilization to support your response.
2. Assume that you are the Chief Information Officer (CIO) for a mid-sized company. Speculate on the overall manner in which you would use mobile visualization technology to aid your risk management activities. Provide a rationale for your response.
Week 9 DB
1. Read the article titled "IT Project Failure Rates: Facts and Reasons", located here: http://faethcoaching.com/it-project-failure-rates-facts-and-reasons/ Next, propose three (3) critical areas or phases that the IT project manager must pay attention to in order to have a successful project completion. Support your response.
Review Fraud Risk Factors. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) policies that a company could put in place in order to counter the risk factor in question.
The fraud factors that are most responsible for increased risk of fraudulent activity include systems that are not protected and are more conducive to fraud being committed by employees, hackers, or others with an opportunity to perpetrate the fraud, employees or management with incentives to engage in fraud, and the lack of oversight of business activities to monitor and track whether fraud is occurring. The factor that is most pressing for the IT department entails a lack of competent security to prevent risks from becoming a problem for the organization. Therefore, to strengthen the system, the audit team for an organization should work in collusion with the IT department to improve the business processes and reduce risks to the financial system and financial processes. By involving IT in the protection of company financial records, assets, etc., the company will be more prepared and better equipped at identifying potential risks while also coordinating their testing abilities of the accounting system to ensure that fraud detection is in adherence with new technology standards.
Therefore, the inclusion of the IT for auditing purposes as a coordinated security system will assist in better responses to risks and threats as the system will be able to use integrated audit techniques to identify fraud risks that are unique to specific business operations. This is how to address the security risks associated with fraud.
Review the types of enterprise systems ERP: Enterprise Resource Planning, SCM: Supply Chain ...
Information Systems for Decision-Making are examined. The main reasons why visualization technologies are becoming an important part of organizational success is examined.